[1]
|
Navigating vulnerability markets and bug bounty programs: A public policy perspective
Internet Policy Review,
2024
DOI:10.14763/2024.1.1740
|
|
|
[2]
|
Comprehensive Comparison of Security Measurement Models
Journal of Applied Security Research,
2023
DOI:10.1080/19361610.2021.1981089
|
|
|
[3]
|
Navigating vulnerability markets and bug bounty programs: a public policy perspective
SSRN Electronic Journal,
2023
DOI:10.2139/ssrn.4593629
|
|
|
[4]
|
Comprehensive Comparison of Security Measurement Models
Journal of Applied Security Research,
2022
DOI:10.1080/19361610.2021.1981089
|
|
|
[5]
|
Context-Aware Ontology-based Security Measurement Model
Journal of Information Security and Applications,
2022
DOI:10.1016/j.jisa.2022.103199
|
|
|
[6]
|
Context-Aware Ontology-based Security Measurement Model
Journal of Information Security and Applications,
2022
DOI:10.1016/j.jisa.2022.103199
|
|
|
[7]
|
A Queueing Solution to Reduce Delay in Processing of Disclosed Vulnerabilities
2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA),
2020
DOI:10.1109/TPS-ISA50397.2020.00012
|
|
|
[8]
|
Stochastic models of just-in-time systems and windows of vulnerability in terms of the processes of birth and death
Вестник Самарского государственного технического университета. Серия «Физико-математические науки»,
2019
DOI:10.14498/vsgtu1725
|
|
|
[9]
|
Non-Homogeneous Stochastic Model for Cyber Security Predictions
Journal of Information Security,
2018
DOI:10.4236/jis.2018.91002
|
|
|
[10]
|
Cybersecurity: A Stochastic Predictive Model to Determine Overall Network Security Risk Using Markovian Process
Journal of Information Security,
2017
DOI:10.4236/jis.2017.82007
|
|
|
[11]
|
Cyber Security: Nonlinear Stochastic Models for Predicting the Exploitability
Journal of Information Security,
2017
DOI:10.4236/jis.2017.82009
|
|
|